Skip to content

Scale Computing Partners With 10ZiG™ to Provide Managed, Secure, and Flexible Virtual Desktop Infrastructure

INDIANAPOLIS — DECEMBER 11, 2024 — Scale Computing, the market leader in edge computing, virtualization, and hyperconverged solutions, and 10ZiG a leading provider of hardware and software thin & zero clients, today announced a partnership to deliver a robust and efficient virtual workspace solution that revolutionizes how organizations manage their IT infrastructure. By combining 10ZiG’s Modernized, Managed, Secure Thin & Zero Client hardware and software solutions with Scale Computing Platform
(SC//Platform), organizations can achieve unparalleled cost efficiency, enhanced security, and exceptional scalability.

“Today’s business leaders are always looking for ways to improve their IT infrastructure, needing more flexibility and scalability to make both in-office and remote work function well. Hyperconverged infrastructure works in tandem with virtual desktop infrastructure (VDI) to easily enable scalable end-user computing, no matter the location,” said Jeff Ready, CEO and co-founder of Scale Computing. “SC//Platform is uniquely positioned to deploy robust virtual desktop infrastructure and provide seamless, secure access via 10ZiG endpoints, regardless of the size of an organization. We’re excited to partner with 10ZiG to offer cutting-edge solutions that are secure, scalable, and easy to manage.”

Many organizations struggle to effectively manage and maintain PC desktop environments. PCs are notorious for creating clutter, consuming excessive energy, generating heat and noise, and keeping IT departments constantly busy. This partnership enables organizations to effortlessly deploy, manage, and scale virtual desktops and applications while maintaining high performance and reliability. 10ZiG’s Thin Clients, known for reliability and superior user experience, seamlessly integrate with Scale Computing’s hyperconverged infrastructure (HCI), providing a centralized, secure, and easily manageable IT environment. Together, 10ZiG and Scale Computing empower organizations to optimize their IT operations, reduce overhead costs, and enhance productivity.

“As IT infrastructure needs evolve and grow, keeping up with the latest technology trends and updates is essential in ensuring that your business stays competitive. VDI is a big part of that. These computing solutions allow organizations to host desktop environments on a centralized server, providing employees with secure remote access to their desktops from any device, anywhere. We’re excited to partner with Scale Computing to help companies improve performance, security, and scalability, while reducing the burden on their IT staff,” said Carl Bell, Regional Sales Director, 10ZiG.

Scale Computing Platform is uniquely positioned to deploy robust VDI and provide seamless, secure access via 10ZiG endpoints. Other key benefits include:

  • Manageability: Users can connect to anything, anywhere, anytime, and from any device running a 10ZiG OS, quickly and securely—all through highly granular access controls designed for managing and authenticating end-user connections. When required, audit-level logging provides comprehensive tracking of all access and usage.
  • Flexibility: Through Scale Computing, users can now take advantage of 10ZiG’s single-vendor endpoint strategy, regardless of platform. Using a combination of 10ZiG Thin Clients, 10ZiG Zero Clients, or RepurpOS, users can breathe new life into aging Windows PCs, laptops, and third-party Thin Clients and turn them into secure Linux endpoints.
  • Security: With the amount and variety of different devices used today, keeping devices and the data on them secure is a significant challenge. VDI helps keep data centralized in the data center, so that a device that leaves a work site with an unauthorized person does not take any critical data with it.

To learn more about deploying secure and flexible virtual desktop infrastructure solutions with the powerful combination of 10ZiG and Scale Computing, please visit www.10ZiG.com.

 

About 10ZiG

10ZiG Technology is a leading Thin & Zero Client hardware and software provider delivering a modernized and secure user experience for VDI, DaaS, or Web-based environments. With 20+ years in the Thin Client endpoint market, no-hassle repurposing software, and easy-to-use free management, 10ZiG is the perfect Single-Vendor strategy. With local support included and a wide range of TAA Compliant options from traditional desktop form factor, Thin Client laptops, and All-In-Ones, along with an array of unique features including Fiber, Wireless support, quad screen, and more, 10ZiG is the secure, managed solution for today’s diverse IT requirements. Our ever-growing 10ZiG ecosystem of technology partners helps keep 10ZiG products cutting-edge and flexible by incorporating leading connection brokers like Omnissa, Microsoft, Citrix, Parallels, Leostream and more. Find your solution at www.10zig.com.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

How to find Go SSH servers on your network

Go SSH potential authentication bypass (CVE-2024-45337) #

On December 11th, 2024, the Go Security Team disclosed a potential vulnerability in the Go standard library’s implementation of SSH, discovered by the Platform.sh Engineering Team.

The issue, assigned CVE-2024-45337, could result in an authentication bypass or potentially incorrect permissions granted to a remote user when connecting to the SSH server. The issue stems from a common usage pattern of the library, which does not verify or report which of multiple SSH public keys were used for authentication to a server.

Note that this is a vulnerability in the Go standard library’s implementation, and thus any product using the standard library to construct an SSH server could be vulnerable. Approximately 19,000 publicly-accessible projects import the relevant package.

Are any updates or workarounds available?

The Go Project has released a new version of Go that partially addresses the issue by making the commonly-misused programming pattern less likely to be used, and offered guidance to programmers on how to more safely use the library.

How to find potentially vulnerable systems with runZero

Because the vulnerable SSH implementation is generally embedded inside other applications, it is not generally possible to determine by filesystem or software examination if the the server is in use. However, runZero’s direct scanning of asset services provides a reliable and powerful mechanism to detect what SSH implementations are listening on your network.

From the Software Inventory you can use the following query to locate potentially vulnerable systems:

product:="Go SSH"

 

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Keepit platform triumphs at Security Today’s CyberSecured Awards 2024

Keepit was honored in three categories: Cloud Security, Data Loss Prevention and Disaster Recovery/Business Continuity.

COPENHAGEN, DENMARK, December 13, 2024 – Keepit, a global provider of a comprehensive cloud backup and recovery platform, is proud to announce it has been recognized at the prestigious 2024 Security Today CyberSecured Awards. The company secured top honors in three categories: Cloud Security, Data Loss Prevention and Disaster Recovery/Business Continuity.

·       WINNER #1 in the category: Data Loss Prevention

·       WINNER #2 in the category: Disaster Recovery/Business Continuity

·       WINNER #3 in the category: Cloud Security (Tie)

Security Today, a leading source for security professionals, unveiled the winners in a press release, recognizing Keepit’s outstanding contributions to the cybersecurity landscape. The CyberSecured Awards celebrate innovation and excellence in cybersecurity solutions.

“The Keepit platform helps companies future-proof their businesses against ever-increasing cyberthreats. With our industry-leading backup and recovery capabilities, companies can rely on continued access to business-critical data, even if they’re targeted by cyberattacks. We’re honored that the Keepit platform was recognized by Security Today’s CyberSecured Awards”,” says Michele Hayes, CMO at Keepit.

Keepit’s commitment to innovation, security, and reliability has positioned the company as a leader in the cybersecurity industry. The Keepit platform was recognized in four categories at the Top Infosec Innovator 2024 Awards, including “Cutting Edge Cloud Backup”, “Most Innovative Cyber Resilience”, “Hot Company Data Security Platform” and “Hot Company Ransomware Protection of SaaS Data”.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

What Is 3-Factor Authentication?

Think about how many times you’ve logged into a system using just a password, and how easy it would be for someone to guess that password — or worse, steal it!

While two-factor authentication (2FA) added a much-needed layer of security beyond just a password, it still leaves room for vulnerabilities. That’s where three-factor authentication (3FA) steps in.

3FA is changing the game for IT teams by taking security a step further. It combines three layers of identity verification to make unauthorized access almost impossible! 😎

Read along to understand what 3FA is, how it works, and why it matters for SMEs like yours.

Understanding Authentication Factors

Authentication revolves around verifying that the person accessing a system is indeed who they claim to be.

This verification relies on three primary factors:

  1. Knowledge factor (what you know): This includes passwords, PINs, or answers to security questions, where the user provides information that only they know. While this is the oldest form of authentication, it is also the most vulnerable to breaches.
  1. Possession factor (what you have): This involves physical items such as a security key, authenticator app, or a TOTP (time-based, one-time password) sent to a registered device. The idea is that the person trying to gain access has possession of something unique.
  1. Inheritance factor (what you are): Biometric authentication like facial recognition, fingerprints, or iris scans fall under this category. These methods leverage physical characteristics that are unique to the individual and difficult to replicate.

3FA leverages all three factors simultaneously to verify identity, making it exponentially harder for cybercriminals to bypass security protocols. ✌️

What Is 3-Factor Authentication?

As 3FA combines all three factors — knowledge, possession, and inheritance, it creates the most secure form of authentication available today.

While 2FA relies on just two of these factors (often knowledge and possession), 3FA adds another layer of assurance by requiring the user to authenticate with their unique biometric data as well.

For instance, when accessing a corporate system, a user might need to:

  1. Enter their password (knowledge factor).
  2. Verify their identity with a security key or authenticator app (possession factor).
  3. Complete the process with facial recognition or a fingerprint scan (inheritance factor).

This additional layer ensures that even if two factors are compromised — say, someone steals your password and security key — they still can’t gain access without your biometric information.

Benefits of 3-Factor Authentication

With cybersecurity threats constantly evolving, SMEs often lack the robust security measures of larger organizations, making them prime targets for hackers. This is why 3FA is worth considering 👇

Stronger Security

By requiring three independent layers of verification, 3FA makes it incredibly hard for attackers to breach your systems.

Even if a hacker gets hold of a password and a stolen security key, they’ll still need biometric data, which is much harder to fake.

Regulatory Compliance

Many industries have strict data protection regulations, like GDPR, HIPAA, or PCI DSS. Implementing 3FA can help SMEs meet these requirements and avoid hefty fines.

Increased Trust

Whether it’s your employees, customers, or partners, people want to know that their data is safe. Using 3FA demonstrates a commitment to security, boosting confidence in your organization.

Future-Proofing

3FA positions your business as ready for the next wave of cybersecurity challenges, reducing potential liabilities!

Let’s now look at how 3FA actually works and its best use cases.

How 3FA Works in Real Life

Paint a picture of an IT manager logging into their system containing sensitive customer data. The 3FA process typically looks like this:

  1. The manager types in their password.
  2. They plug in their security key or open their authenticator app to generate a one-time code.
  3. They finish the login process by scanning their fingerprint or using facial recognition.

Each step verifies a different aspect of their identity, creating a nearly foolproof barrier against unauthorized access.

3FA is especially effective in scenarios where the stakes are high, such as:

  • High-security systems: Protecting sensitive business data and intellectual property from cyberattacks.
  • Large financial transactions: Adding an extra layer of assurance for payments or account changes above a certain threshold.
  • Remote work: Ensuring employees accessing systems remotely are thoroughly authenticated.

Challenges of 3FA (and How to Overcome Them)

While 3FA offers top-notch security, it’s not without its challenges:

  1. Usability: Adding a third authentication step can feel tedious for users but the solution for this is to invest in tools, like facial recognition or security keys, that streamline the process without compromising security.
  1. Cost: For tools like biometric scanners or secure hardware tokens, implementing 3FA requires a financial investment. This might feel daunting, but the long-term benefits of avoiding breaches and building trust are worth the cost! 🙌
  1. Technology compatibility: As not all systems and devices support 3FA out of the box, SMEs need to assess their infrastructure and make upgrades wherever necessary.

This generally involves evaluating both software compatibility and hardware capabilities to ensure a smooth implementation.

The Future of Authentication Is Passwordless

Since passwords are easy to forget, easy to steal, and often reused across accounts, they are quickly becoming outdated. So, what’s next?

Passwordless authentication is the next big thing, and it pairs well with 3FA.

Emerging technologies like advanced biometric authentication and behavioral analytics are further changing the IT game. For instance, some systems are able to analyze how you type or move your mouse to verify your identity.

While 3FA is the gold standard today, the future of authentication promises even more seamless and secure options.

How to Implement 3FA in Your SaaS

To successfully adopt 3FA, make sure you:

  • Evaluate current security protocols: Identify vulnerabilities and assess whether current systems support multi-factor authentication (MFA).
  • Invest in advanced tools: Acquire the necessary tools such as security keys, biometric devices, and authenticator apps.
  • Train employees: Educate employees on the importance of 3FA and provide step-by-step guidance on using authentication tools effectively.
  • Monitor and optimize: Continuously review authentication logs and update systems to ensure ongoing protection against emerging threats.

JumpCloud streamlines this process by integrating MFA and other advanced security measures into a single, scalable solution. ⚡

Enhance Security with JumpCloud’s 3FA

With the rise in cybersecurity threats, SME IT teams need solutions that go beyond the basics and 3FA is one such advanced solution.

If you’re looking to strengthen your IT security and keep breaches at bay, adopting 3FA is a must. JumpCloud makes it simpler than ever by seamlessly integrating advanced authentication methods, including 3FA, into your existing workflows.

What’s more, with JumpCloud you can enhance security, ensure compliance, and build trust across your organization without sacrificing usability! Start a self-guided demo to see how.

About JumpCloud
At JumpCloud, our mission is to build a world-class cloud directory. Not just the evolution of Active Directory to the cloud, but a reinvention of how modern IT teams get work done. The JumpCloud Directory Platform is a directory for your users, their IT resources, your fleet of devices, and the secure connections between them with full control, security, and visibility.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Secure your data in 5 steps: A quick guide to CloudM Backup

Remote work and cloud infrastructure have revolutionized productivity, but they’ve also introduced new risks. A larger digital footprint means more opportunities for cyberattacks, data loss, or accidental deletions. Prevention is critical, but when things go wrong, a robust backup system is your safety net. 

CloudM Backup offers a dedicated, automated, and compliant solution to safeguard your data in minutes. Here’s how to get started in five simple steps:

Step 1: Set up your storage bucket in Google Cloud Storage

Start by creating a secure destination for your data backups. A storage bucket in Google Cloud Storage is where your data will be saved.

To create your bucket, you’ll need:

  • A Google Cloud billing account
  • Permissions to create or manage a GCP project

TIP: Automate the setup process using our PowerShell script for faster, error-free configuration. Full instructions are available in our Knowledge Base.

If you already have a Google Cloud Storage bucket, you can skip to Step 2!

Step 2: Assign permissions to your Backup admin

Designate a backup admin to manage and restore your data. For more control, create a new admin role with specific permissions. Permissions can be assigned via the settings page of your CloudM account. 

Permissions to assign:

  • Edit Backup Configuration & Policies
  • Backup User Restoration & View Status
  • Backup Shared Drives Restoration & View Status

To manage Organizational Units (OUs) and Smart Teams, assign permissions such as: 

  • Manage OUs
  • Manage Smart Teams
  • Manage Smart Teams Priority
  • Manage Users
  • View OU Hierarchy

TIP: Limit admin access by creating a role scoped to specific Organizational Units (OUs). Assign the role to users via the ‘Assigned Users’ tab.

play_circle

 

Step 3: Enable domain-wide delegation for seamless access

Set up a domain-wide delegated service account to connect your Google Cloud Storage bucket and apply backup policies. This step ensures efficient API usage and uninterrupted access. Visit our knowledge base for detailed instructions.

Step 4: Connect your Google Cloud Storage bucket to CloudM Backup

With your bucket ready, link it to CloudM Backup for synchronization. Simply navigate to the storage configuration page, select your bucket, and provide a Service Account key.

TIP: Test your connection to confirm everything works smoothly before proceeding.

 

Step 5: Create and assign your Backup policy

Craft customized backup policies to define what gets backed up and for how long.

  • Navigate to ‘Create and Edit Policies’ and choose the policy type (Users or Shared Drives).
  • Assign policies to OUs, Smart Teams, or Shared Drives as needed. 

TIP: Regularly review and adjust your policies to stay compliant with evolving regulations.

Sit back and relax

With these five steps, you’re now backup-ready! CloudM Backup ensures your organization’s data is protected, compliant, and recoverable, providing peace of mind and reliable business continuity.

About CloudM
CloudM is an award-winning SaaS company whose humble beginnings in Manchester have grown into a global business in just a few short years.

Our team of tech-driven innovators have designed a SaaS data management platform for you to get the most from your digital workspace. Whether it’s Microsoft 365, Google Workspace or other SaaS applications, CloudM drives your business through a simple, easy-to-use interface, helping you to work smarter, not harder.

By automating time-consuming tasks like IT admin, onboarding & offboarding, archiving and migrations, the CloudM platform takes care of the day-to-day, allowing you to focus on the big picture.

With over 35,000 customers including the likes of Spotify, Netflix and Uber, our all-in-one platform is putting office life on auto-pilot, saving you time, stress and money.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×